1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
4 years ago
13

Considers the assets of all things in an environment, and refers to the layering of security tools and methods often varying num

erous parameters between layers, in an effort to restrict or prevent malicious users from penetrating anything more than the outer layers.
A.Protects assets in an information system environment by employing firewalls and information security policies.
B.Provides a roadmap for securing physical access points to a building as well as controlling the access to those points.
C.Guarantees protection of all layers in an information security architecture and infrastructure by employing multiple methods of protection between layers and across domains.
Computers and Technology
1 answer:
defon4 years ago
4 0

This question is incomplete, here is the complete question gotten from google:

Defense-in-depth is a strategy that: (choose best answer)

 a.  Considers the assets of all things in an environment, and refers to the layering of security tools and methods often varying numerous parameters between layers, in an effort to restrict or prevent malicious users from penetrating anything more than the outer layers.

  b. Protects assets in an information system environment by employing firewalls and information security policies.

 c.  Provides a roadmap for securing physical access points to a building as well as controlling the access to those points.

  d. Guarantees protection of all layers in an information security architecture and infrastructure by employing multiple methods of protection between layers and across domains.

Answer:

Defense-in-depth is a strategy that  guarantees protection of all layers in an information security architecture and infrastructure by employing multiple methods of protection between layers and across domains - option C.

Explanation:

An approach to cybersecurity in whereby a series of defensive mechanisms are layered in order to protect valuable data and information is known as Defense in Depth (DiD) strategy .

In   DID, If one mechanism fails, another steps up immediately to obstruct an attack. This multi-layered approach with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors.

Defense in Depth (DiD) strategy is only known for the description in option C, but it is not known for what is described in options A and B.

Thus, option C is the best answer

You might be interested in
What data unit is encapsulated inside a packet?<br> frame<br> datagram<br> segment<br> session
AVprozaik [17]
The answer is frame
8 0
4 years ago
Read 2 more answers
Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be descr
const2013 [10]
  • There are games that cannot be described as a single or two genres.
  • Yes there should be some genres invented.
  • Because games are now become a everyday requirement for entertainment .

Uses of genre:-

  • Genres are used in Readers as well as writers.
  • By using genre patterns in writers it has been accepted by readers for accomplishing their purposes.
  • Genres allow both writers and readers to establish a working relationship between each other.
  • Both writers and readers are required for gamers and game publishers.
  • So Genres are very useful to them.
5 0
3 years ago
If Carly wants to add wind belts for the part of the Atlantic just south of the equator, how should she draw the arrows?The arro
AnnyKZ [126]

If Carly wants to add wind belts for the part of the Atlantic just south of the equator, she should draw the arrows upward to the left. <span> At the South of the equator are trade winds which blow wind from the northeast toward the equator. </span>

4 0
3 years ago
Which topology connects multiple star-topology networks using a bus topology?
Oliga [24]

Answer:

Mesh

Explanation:

Hope it will help

<h2><em>p</em><em>l</em><em>e</em><em>a</em><em>s</em><em>e</em><em> </em><em>m</em><em>a</em><em>r</em><em>k</em><em> </em><em>a</em><em>s</em><em> </em><em>a</em><em> </em><em>b</em><em>r</em><em>a</em><em>i</em><em>n</em><em>l</em><em>i</em><em>s</em><em>t</em><em>s</em></h2>
3 0
3 years ago
Which is an example of synchronous communication. Text message e-mail voicemail telephone conversation
enot [183]

Answer:

Text Messages

Explanation:

Synchronous communication is a simultaneous communication between two people. This is the type of serial communication where two person can communicate at the same time. This type of communication exclude face to face communication and phone communication.

for example

during Chat when we are taking to someone he also can reply the same time.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Your grandmother tells you a dollar doesn’t go as far as it used to. She says the “purchasing power” of a dollar is much less th
    13·1 answer
  • How can you have a safe browsing experience
    5·1 answer
  • Which education level has the highest return on investment (ROI)? AHigh School Diploma BROI is equal for all of the above. CSeni
    6·1 answer
  • What year did Elvis die? Right answer 1977.
    14·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • A predictive data analyst ___
    11·1 answer
  • Devices that allow for the retention of data when your computer has been shutdown
    10·1 answer
  • How can computational thinking techniques be applied to software development
    6·1 answer
  • Discuss any five factors that hinder the application of a computer in business organisations​
    15·2 answers
  • What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!